News

2017-09-25

Is A Cyberattack An Act of War?

As warfare becomes increasingly digital, countries are facing a major problem: It’s hard to define when a cyber attack constitutes an act of war.

2017-09-21

Get Your Data Strategy On Board

Only 32% of UK organisations plan to significantly invest in data and analytics in 2017, according to new research by DataIQ Leaders.

2017-10-05

The Hidden History of CyberCrime Forums

In 2001 a crime forum created to monetise stolen credit card numbers formed the framework for today's criminal underground.

2017-09-25

Banks Join Forces to Fight CyberCrime

Local and international banks in the United Arab Emirates are sharing information in an effort to reduce cyber attacks.

2017-09-20

What Is Selling On the Dark Net?

Illegal guns. Drugs. Counterfeit money. Ransomware. Credit Card data. German Police turn a spotlight on the Dark Net.

2017-10-04

A Global Issue: Cybercrime In Singapore

Cybercrime in Singapore nearly doubled between 2014 and 2016 and it is a penalty of a high level of connectivity.

2017-10-04

The Shifting Sands of Cybersecurity

Today’s security teams need to come up with new tactics to fend off more advanced threats from increasingly interconnected enterprise networks.

2017-10-04

What is Big Data?

When people talk about big data, they mean the ability to take large portions of data, analyse it and make it useful. But it is really more than that.

2017-10-03

AI Makes People In Your Business More Important

AI is already a part of consumer applications and is fast becoming a larger part of our work environment. But if you want subtlety, get a human.

2017-10-03

In The House Or In The Cloud: Which Is More Secure?

There are many reasons to deliberate carefully before choosing an in-house or cloud service delivery model.

2017-10-02

Big Data - Big Changes Coming

There is one hurdle to the rapid growth of data; the shortage of highly skilled individuals who can analyse and crunch the data to make it valuable.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Cyber Exec

Cyber Exec

Cyber Exec is an executive search firm dedicated to global talent acquisition in Cyber Security, Information Technology, Defense...

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

QuantiCor Security

QuantiCor Security

QuantiCor Security is one of the world’s leading developers and manufacturers of quantum computer resistant security solutions for IT infrastructures and the Internet of Things (IoT).

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.